Skip to main content
University of Massachusetts Presidents Office
Utility Navigation
  • Directory
  • Careers
  • Log in
  • Academic Affairs, Student Affairs & Equity
  • Access Team: Admin & Finance Support Services
  • Board of Trustees
  • Budget Office
  • Communications
  • Controller
  • Enterprise Risk Management Program
  • Facilities & Operations
  • Government Affairs
  • Human Resources
  • Information Technology Services
  • Innovation and Operational Services
  • Internal Audit
  • Office of the General Counsel
  • Payroll
  • Travel and Expense
  • Treasurer
  • Unified Procurement Services Team
Main navigation
  • About
  • Organization
  • Reports and Initiatives
Utility Nav Mobile
  • Directory
  • Careers
  • Log in
  • Academic Affairs, Student Affairs & Equity
  • Access Team: Admin & Finance Support Services
  • Board of Trustees
  • Budget Office
  • Communications
  • Controller
  • Enterprise Risk Management Program
  • Facilities & Operations
  • Government Affairs
  • Human Resources
  • Information Technology Services
  • Innovation and Operational Services
  • Internal Audit
  • Office of the General Counsel
  • Payroll
  • Travel and Expense
  • Treasurer
  • Unified Procurement Services Team
  1. Back to Home

Search UMassP.edu

  • Data Security and Classification Guidelines
    (Doc. T97-010) The University relies heavily on its electronic data processing systems and the data stored in them to meet its educational, research, informational and operational needs. It is essential that these systems be protected from misuse and that both the computer systems and all data be accessed and maintained in a secure environment. Data should be used responsibly and ethically., I. Purpose, These Guidelines are issued pursuant to the Board of Trustees' Policy Statement on Electronic Data Security, Electronic Mail and Computer Policy Development (Doc. T97-010, adopted February 5, 1997) and: Outline responsibilities related to data security, signature imaging and documentation at the University of Massachusetts (the University); Provide guidelines for the security, access and…, II. Scope, Campus procedures regarding data security and classification shall: Comply with and be based on the laws of the Commonwealth of Massachusetts, the United States and other regulatory agencies. This includes all applicable federal and state laws which govern the privacy and confidentiality of data, including the Electronic Communications Privacy Act of 1986, Family Educational Rights and Privacy…, III. Responsibilities, The President, together with the Chancellors, will issue guidelines which will: Define what categories of individuals (e.g., full time, part-time, staff, students, economic partners, other educational institutions, general public, etc.) may access University data; Determine what data are considered "institutional data" for the University. The President shall appoint a Common Services central…, IV. Data Security, Campus standards regarding data security and classification shall require that: University data are protected in a manner which is commensurate with its classification and value; The cost of data security is commensurate with the classification and value of the data being secured; To the extent necessary, information is safeguarded by security systems designed for the protection of, detection of…, V. Data Classification, Campus standards regarding data security and classification shall require that University data classifications are adhered to. Five levels of data classification have been established. The data classifications DO NOT apply to correspondence or memorandum EXCEPT when the correspondence/memorandum contains other than unclassified data. The data classifications determine how the data will be secured…, VI. Data Access and Use, Undefined or unclear guidelines or procedures shall not be construed to imply access authorization. Campus procedures regarding data security and classification shall require that: Only authorized users have access to University data; Access to data other than unclassified data is denied unless the user has obtained explicit approval by the data custodian; Access to data classified as Private,…, VII. Signature Imaging, Data custodians should understand that signature imaging is not a secure method of authorization. Custodians should seek the level of secure authorization most appropriate for their data's classification. Each new use of any electronic authorization process or signature imaging within a computer application must be approved by the Chancellor of the campus instituting the new procedure. The system…, VIII. Compliance And Enforcement, Campus procedures regarding data security and classification should require that any individual found misusing data, divulging confidential data or otherwise violating these Guidelines may be denied or given limited (i.e., to allow for the performance of required academic or employment related tasks) access to data and/or University computer systems, and shall be subject to reprimand, suspension…
    Type: Book page
  • Electronic Mail Guidelines
    (Doc. T97-010) The University works in a large, complex information technology environment requiring communication related to both confidential and public data. New technologies offer the University methods to make this communication easier between students, staff, departments, campuses, colleges, and the world. The University has several types of electronic mail systems on its various computer…, I. Purpose, These Guidelines are issued pursuant to the Board of Trustees' Policy Statement on Electronic Data Security, Electronic Mail and Computer Policy Development (Doc. T97-010, adopted February 5, 1997) and: Define who may use the electronic mail systems controlled and administered by the University of Massachusetts (the University); Outline responsibilities related to electronic mail maintenance and…, II. Scope, Campus procedures relating to electronic mail shall apply to all: Electronic mail (e-mail) created within, sent to, maintained within, or administered by the electronic mail systems of the University of Massachusetts; University e-mail users; Electronic mail as defined in the Definitions Addendum to these Guidelines., III. Responsibilities, The President, together with the Chancellors, shall define what categories of individuals (e.g., full time, part-time, staff, students, economic partners, other educational institutions, general public, etc.) may access University electronic mail systems. The Chancellors, or their designees, will determine: Which University department(s) shall be responsible for administering electronic mail…, IV. Electronic Mail Use Guidelines, Campus procedures relating to electronic mail will require that: Individuals are prohibited from using an electronic mail account assigned to another individual to either send or receive messages. If it is necessary to read another individual's mail (e.g., while they are on vacation, on leave, etc.), surrogacy or message forwarding should be utilized. The University makes e-mail facilities…, V. Electronic Mail Information, Campus procedures relating to electronic mail will require that e-mail users are aware and understand that: The University considers a personal e-mail message to be private correspondence within the limits set forth in this section, but due to the nature of the electronic medium the University cannot guarantee the privacy or security of such correspondence and e-mail users are cautioned that such…, VI. Compliance And Enforcement, Campus procedures regarding electronic mail will require that any individual found breaching the confidentiality of e-mail messages, disclosing confidential University data by using e-mail, or otherwise violating these Guidelines, may be denied or given limited (i.e., to allow for the performance of required academic or employment related tasks) access to the e-mail and/or University computer…
    Type: Book page
  • Definitions Addendum
    Computer Security and Usage Guidelines Data Security and Classification Guidelines Electronic Mail Guidelines, Academic Computing, refers to computer systems that support the research and educational mission of the University., Administrative Computing, refers to computer systems that support the operational functions (e.g., financial, payroll/personnel, library, and student related data such as major, grades, courses, etc.) of the University., Anonymous Connection, is the act of connecting to a remote computer as an unidentified or anonymous user., Approved Users Authorized Users, who have been given explicit access to specific data by the Data Custodian., Audit Trail, is a log(s) of specified access (e.g., when, how, from where and by whom data is accessed). For example, a log of all changes to student grades would be kept to monitor who was accessing such confidential data and what they were doing (e.g., reading, updating, deleting)., Authorized Users, are all students and employees (including student, non-student, faculty, professional, classified, temporary, part-time, and full-time), and contracted consultants of the University of Massachusetts who are required to have access to data to perform their job function, academic assignment, or contractual obligations. Authorized users also include those individuals who are assigned courtesy…, A Bulletin Board/Newsgroup, is a service that enables users to post information for or seek information from others who are interested in a certain topic(s)., Campus or University Computing Infrastructure, refers to the underlying technology (e.g., hardware, cabling, telecommunications and software) required to support the primary University/Campus computing and data communications environments which are usually maintained by computing centers. This does NOT include departmental computing resources (e.g., a department level computing system or network)., Campus Procedures, are statements designed to comply with the requirements of University Guidelines by establishing specific criteria that must be met by University students, staff, consultants, etc., Central Security Specialist, is an individual(s) at each campus and the President's Office who has experience, knowledge and understanding of information systems security practices/requirements and who is responsible for data and computer security planning, oversight, and coordination., Classified Data, refers to University data which has been identified as Operational, Private, Restricted or Confidential., Computer Applications, are sets of computer programs which when run read or modify data, and which can generate output such as reports, bills, checks, etc., Computer Security, refers to the development and implementation of a system of controls which when implemented will REDUCE the PROBABILITY of something negative occurring (e.g., unauthorized file access or modification). Computer Security includes the following categories of control: Administrative (e.g., polices/procedures, personnel, and contingency planning); Hardware; Software (e.g., operating and application…, Computer System(s), refers to the hardware, software and communications equipment used in the processing and storage of electronic data., Confidential Data is University, data whose loss, corruption or unauthorized disclosure would be a violation of federal or state laws/regulations or University contracts., Courtesy Accounts, are accounts on University computer systems which may be provided to individuals who are not University employees, students, or contracted consultants but who have an established relationship with the University and need access. Examples include alumni, business partnerships, individuals from other educational institutions, etc., Data, refers to information regardless of the medium on which it resides (i.e., tape, cartridge, disk, hard drive, etc.), and regardless of its form (e.g. text, graphic, video, voice, etc.)., Data Integrity, refers to the completeness and accuracy of data., Data or Information Security, shall mean the implementation of reasonable safeguards to prevent unauthorized access, theft, removal or misuse of University electronic data (i.e., tape, cartridge, disk, hard drive, etc.)., Data Custodian(s), are the individual(s) responsible for making decisions about the sensitivity and critically of specific University systems and data stored in these systems; determining the classification of data under their control; documenting the use of the specific system(s); and determining which University staff require access to that system and its data. University policy may restrict or dictate the Data…, Degree of Risk or Levels of Risk, refer to the amount of exposure and/or vulnerability associated with a particular entity such as a computer system. Examples of exposure or vulnerability include theft; unauthorized access; unauthorized alternation or destruction of the computer system or the data stored on it; human error; natural disasters, etc., Deleted E-Mail, refers to any e-mail which an e-mail users has specifically deleted/removed from their e-mail mailbox or electronic mail files., Electronic Mail (e-mail), refers to letters, files and messages sent by one computer user or a software agent to a specific user or set of users within the same computer system or over a computer network., Electronic Mail Id, is a unique code which identifies a specific person to an electronic mail system., An Electronic Mail Administrator, is the individual responsible for making decisions about how an electronic mail system(s) should be maintained, determining classes of individuals which may use the electronic mail system, and determining how the mail system and its capabilities will be implemented and secured., An Electronic Mail System, is a computer which has e-mail capabilities on it., Electronic Signature, is the method of ensuring that the purported signer of a document was the actual signer and the document has not been modified since signed., Employees, are all student, non-student (faculty, professional, classified), temporary, part-time, full-time, contracted and consultants who are paid from University funds and require access to electronic data to perform their job function., External E-mail, Users are individuals who communicate with University mail systems from mail systems not controlled or administered by the University (e.g., Internet)., A Filter, is a security method to "hide" e-mail message text from the view of electronic mail maintenance personnel., Idle Time or Time-Out, refers to a capability within computer systems to disconnect an authorized user if that user is logged on and has not communicated with the computer for a specified period of time (i.e., 15 minutes)., Internet, is a network of computers that allows its users to send mail or access data world-wide., Levels of Risk or Degree of Risk, refer to the amount of exposure and/or vulnerability associated with a particular entity such as a computer system. Examples of exposure or vulnerability include theft; unauthorized access; unauthorized alternation or destruction of the computer system or the data stored on it; human error; natural disasters, etc., Licensed Software, is software that has been developed for commercial "sale" or for limited/restricted use. The software developer maintains copyright to the software and sells others the right to use the software for a fee. Note that the developer retains ownership of the software and controls how the software can be used., A Logon or Operator Id, is a unique code that identifies a specific person to the computer system. A Logon or Operator Id may also identify a type of user (i.e., Internet) to the computer system., Mailbox, is the area in the computer in which e-mail users receive electronic mail messages., Message Encryption, is the scrambling of e-mail messages so they are more secure and not easily read by anyone other than the designated recipient who has been given the "key" to unscramble the message., Operational Use Only Data University, data whose loss, corruption or unauthorized disclosure would not necessarily result in any business, financial or legal loss BUT which is made available to Data Custodian approved users only., Packet, refers to a "bundle" of information sent over network. Packets usually include information regarding where the data is being sent, the actual data, and a record indicating the end of the packet., Packet Sniffing, is a technique in which an individual inserts a software program at remote network switches or computers for the purpose of monitoring information sent over the network., A Password, is a confidential, unique code used in conjunction with the logon id to verify that the user trying to access the computer is the person to whom the Logon/Operator ID was assigned., Password Creation Checking, is the process of a computer system comparing a user's password to words in a dictionary; user specific data such as logon id, name, birth date, social security number; and common character sequences such as "123456" or "abcdef"., Private Data, is University data whose disclosure would not result in any business, financial or legal loss BUT involves issues of personal credibility, reputation, or other issues of personal privacy., Protocol, is a set of formats and procedures governing the exchange of information between computer systems., Public Domain Software, is software for which the titles and copyrights have been explicitly relinquished by the author, so that anyone can use it as they please, free of charge., Rebroadcast, is to transmit or make information accessible to individuals not materially involved in the issue that the information relates to (e.g. posting the information to a newsgroup, emailing it to others, or creating a link to the information from a publicly available Web page)., Research Computers, are any University computers which contains data related to faculty/staff/student research. This does not include the accounting data related to the financial functions of a research grant., Restricted Data, is University data whose loss, corruption or unauthorized disclosure would tend to impair the business or research functions of the University, or result in any business, financial, or legal loss., Retention Standards, are requirements which indicate the period of time a type of data or message should be retrievable., Secured Data, refers to data that is available to authorized users who require this access to perform their job function and who have obtained Data Custodian approval for this access., Server, refers to computers that provide resources or information to other computers. There are many types of servers including file servers, terminal servers, and name servers., Shareware, refers to copyrighted software whose license allows the software to be freely copied and shared. The use of Shareware usually requires the payment of a fee after some time period specified in the software's license., Signature Images, refer to the entry of a signature on a computerized document by electronic means., Staff, refers to all non-student (faculty, professional, classified), temporary, part-time, full-time, contracted and consultants who are paid from University funds and require access to electronic data to perform their job function., Students, are all individuals enrolled at the University of Massachusetts and its programs. This includes individuals attending day, continuing education, graduate and/or undergraduate sessions who may be part-time or full-time students. (NOTE: While performing job functions related to student employment with the University, students are considered employees and must therefore abide by employee related…, Student Data, refers to data that is created by University students., Surrogacy, refers to a situation in which an authorized e-mail user has given another authorized e-mail user permission to access certain features of their mail account. The surrogate uses their own mail id to access the other users mail features, they DO NOT use the other users mail id. For example, a Department Head or Director may give their assistant surrogate access to their mailbox so that the…, A Third Party, is any individual, group of individuals, bulletin board, conference or newsgroup either within the University or at any other location world wide who is not originally addressed in the e-mail message., Third Party Data, is any data supplied by and/or maintained for a Third Party., Time-Out, or Idle Time refers to a capability within computer systems to disconnect an authorized user if that user is logged on and has not communicated with the computer for a specified period of time (i.e., 15 minutes)., Trojan Horse, Virus, or Worm, is computer code designed to self-replicate, damage, or otherwise hinder the performance of a computer's memory, file system, or software., Unauthorized User, is any individual accessing data which is other than non-classified to which they have not been given explicit approval by a Data Custodian., Unclassified Data, is University data that does not fall into any of the other data classifications (i.e., Operational, Private, Restricted or Confidential). This data maybe made generally available without specific Data Custodian approval., University Data, is data created, executed or received by an University employee (i.e., full or part time, temporary, professional, classified or faculty) in connection with the transaction of University business. Categories of University data are Financial, General, Medical, Personnel, Student, etc., University E-mail, Users are all individuals who have accounts on electronic mail systems under the control and administration of the University of Massachusetts., University or Campus Computing Infrastructure, refers to the underlying technology (e.g., hardware, cabling, telecommunications and software) required to support the primary University/Campus computing and data communications environments which are usually maintained by computing centers. This does NOT include departmental computing resources (e.g., a department level computing system or network)., University Guidelines, are statements designed to achieve the requirements of University Policies by establishing specific criteria that must be met in Campus Procedures., University Policies, are concise statements of direction and required action issued only by the Board of Trustees., Virus, Worm or Trojan Horse, is computer code designed to self-replicate, damage, or otherwise hinder the performance of a computer's memory, file system, or software., Web Page, refers to a page of information available on the World-Wide web network., World-Wide Web, is a distributed information system that can be accessed to retrieve data in text, video or audio format., Worm, Virus or Trojan Horse, is computer code designed to self-replicate, damage, or otherwise hinder the performance of any computer's memory, file system, or software.
    Type: Book page
  • Policy on Undergraduate Student Transfer and Visitor Interchange & Guidelines (T97-107)
    Doc. T97-107, Passed by the Board of Trustees on December 3, 1997, Policy on Undergraduate Student Transfer and Visitor Interchange, Campuses shall provide opportunities for enrolled students to transfer with ease (transfer interchange) or to take courses (visitor interchange) at any other campus of the University. The President and Chancellors shall take the appropriate steps to implement streamlined transfer interchanges and visitor interchanges. Transfer interchanges and visitor interchanges, shall be available to students…
    Type: Book page
  • Performance Measurement System (T97-111)
    Doc. T97-111, Passed by the Board of Trustees on December 3, 1997 There shall be a performance measurement system for the University of Massachusetts to evaluate campus performance related to the following objectives: To ensure the high quality of academic programs and services. To promote student access and affordability. To recruit qualified undergraduate and graduate students. To promote student success. To…
    Type: Book page
  • Accounts Receivable Policy (T97-118)
    Doc. T97-118, Passed by the Board of Trustees on December 3, 1997, Purpose, Accounts receivable represent balances owed to the University of Massachusetts for tuition and fees, credit sales of goods or services, and reimbursements related to grants and contracts. The purpose of this policy is to: Maximize revenues through collection of all amounts due Ensure compliance with applicable state and federal laws Establish guidelines for the approval, control and accounting…, Scope, This policy pertains to all amounts due the University of Massachusetts. It does not apply to patient receivables, or loans to students, or loans between University funds., Delegation, The Board of Trustees has fiduciary responsibility for the collection of all funds due the University of Massachusetts. The Board of Trustees hereby assigns to the Chancellor of each campus general responsibility for collection of all amounts owed to the University. Responsibility for accounts receivable due the President’s Office or University Central Administrative Services is assigned to the…
    Type: Book page
  • Academic Quality Assessment and Development (AQAD) Guidelines (T98-033)
    Doc. T98-033, A component of the University Performance Measurement System, Doc. T97-111 Academic Quality Assessment and Development is a component of the University Performance Measurement System. The primary purpose of this component is to assess and improve the core academic functions of teaching and learning, research/professional/creative activity, and public service/academic outreach through an ongoing…, Process, Each Program shall be reviewed on a regular cycle. Ordinarily, the length of time between reviews may be no more than five to seven years, but campus procedures may establish the circumstances under which exceptions to this timeframe may be granted. Each Program review shall be conducted with the participation of Program faculty members. Each Program review shall consist, minimally, of the…, Core Criteria and Related Questions, Programs shall ensure that their goals and objectives are linked to the campus mission and strategic priorities. The Program should evaluate its purpose and planning in light of the campus mission and strategic priorities. The review should answer the following questions: What is the Program’s mission and is it clearly aligned with the campus mission and direction? How does the Program’s mission…
    Type: Book page
  • Undergraduate Financial Aid Policy & Guidelines (T98-050)
    Doc. T98-050, Passed by the Board of Trustees on June 3, 1998, University Policy, Qualified undergraduate students shall be admitted to the University of Massachusetts without regard to financial need.
    Type: Book page
  • UMass Boston Student Government Association Constitution (T98-059)
    Doc. T98-059, as amended, Passed by the Board of Trustees on June 3, 1998 Latest revision: August 23, 2006, Chapter I: Duties Of Officers, Section A: The President, The President of the Student Senate shall have all powers and restrictions given by the Constitution and Bylaws of the Student Senate. The Senate President shall have the power of veto, requiring a 2/3 vote majority of those present and voting to overturn. A veto may be executed up to the approval of the minutes of the next scheduled meeting. After a veto has been exercised, a motion to…, Section B: The Vice President, The Vice President of the Student Senate shall have all powers and restrictions given by the Constitution and Bylaws of the Student Senate. The Vice President shall, in the absence of or at the discretion of the President, preside over all meetings of the Senate and the Executive Committee. The Vice President shall have executive authority on behalf of the Senate, subject to the approval of the…, Section C: The Representative to the Faculty Council, The Representative to the Faculty Council shall have all powers and restrictions given by the Constitution and Bylaws of the Student Senate. The Representative to the Faculty Council shall have executive authority on behalf of the Senate at meetings of the Faculty Council. The Representative to the Faculty Council shall be a member of the Campus and Community Affairs Committee., Section D: Committee Chairs, The Chairpersons of the standing committees shall have all powers and restrictions given by the Constitution and Bylaws of the Student Senate. Chairpersons shall have executive authority on behalf of their committees, subject to ratification thereof., Chapter II: Powers and Procedures of Standing Committees, Section A: Voting Rights, All Student Senators must participate on a standing committee. Senators may be voting members on one standing committee, and may participate in other committees, but only with non-voting status, with the exception of Executive Committee members who may vote on one other committee. The Chairs of standing committees will vote to break ties only, and are considered voting members of their committee…, Section B: The Executive Committee, The Executive Committee shall, gather and publish a current edition of the Constitution, Bylaws and Committee Policy guidelines for each new fiscal year or incoming senator. Executive may contribute to the reviews on non-student, Student Activities and Leadership personnel. The only exception is that the Budget and Finance Committee may contribute to the review of accounting staff. The SGA…, Section C: The Budget and Finance Committee, The Budget and Finance Committee (B&F) shall adhere to the following procedures in exercising it’s responsibilities: All meetings shall adhere to the open meeting law. All meetings will be run under policies, procedures, and regulations, approved and set forth by the committee. Budget and Finance Committee: No senator who is paid from the Student Activities Trust Fund or Revenue Cost Centers…, Section D: The Campus and Community Affairs Committee, The Campus and Community Affairs Committee (CCA) shall adhere to the following procedures in exercising it’s responsibilities: All meetings shall adhere to the open meeting law. All meetings will be run under policies, procedures, and regulations, approved and set forth by the committee. CCA is the internal and external relations branch of the SGA. The scope of the CCA shall include but not be…, Section E: The Student Events and Organizations Committee, Student Events and Organizations Committee: No officer of a Recognized Student Organization shall also sit on Student Events and Organizations Committee. No Senator who works for a Center shall also sit on the SEOC Committee. All meetings shall adhere to the open meeting law. All meetings will be run under policies, procedures, and regulations, approved and set forth by the committee. The Student…, Section F: The Student Arts and Events Council, The Student Arts and Events Council (SAEC) shall adhere to the following procedures in exercising its responsibilities. The Council shall carry out its responsibilities while receiving advice from the Advisor to SAEC. No University official or staff employee will attempt to restrict or otherwise define the operation of the SAEC without prior consultation with the entire Student Senate except…, Chapter III: Elections, Section A: Elections Task Force Ad-Hoc Committee, The Elections Task Force Ad-Hoc Committee, as appointed at the last full Senate meeting of the fall session by the Student Senate along with recommendations from the Executive Committee, oversees elections procedures within Chapter Two of the Bylaws. No member shall sit on the ETFAC who is a candidate running for election., Section B: Funding for Elections, The Student Senate will allocate to the Elections Task Force Ad-Hoc Committee funds sufficient to cover the expenses of the election process. The amount shall be decided upon by the Elections Task Force Ad-Hoc Committee and the Budget and Finance Committee prior to each election process., Section C: Announcements, Elections for Student Government and Student Trustee shall officially be announced on the first day after the add/drop period ends in the spring semester. Announcements shall be made in the campus newspaper, and in general posting. The announcements will include the following information: Where and how to become a candidate. The number of seats available per college. Brief description of the…, Section D: Nominations, The nomination period will begin at least ten (10) class days after the first announcements are made. The nomination period shall be open for at least ten (10) class days. Nominees shall have to meet the requirements set in the Student Government Constitution article V. At least two (2) class days shall be given for verification of all candidates. All ineligible candidates shall be notified by…, Section E: Campaigning, The campaign period shall begin on the first class day following the completion of verification of all nominees. The campaign period shall be no longer than ten (10) class days. During this period, there shall be at least two (2) open debates/forums for all the candidates. Referendum campaigning: The campaign period for referendum questions shall begin on the first class day following…, Section F: Voting, The voting period shall begin not later than three (3) class days after the end of the campaign period. The voting period shall last at least three (5) class days. There shall be no campaigning within twenty-five (25) feet of polls. The polls shall have one staff and one student present at all times. Every matriculated undergraduate student who is recorded by the Registrar’s Office is entitled to…, Section G: Electronic Tabulations, All tabulations will come directly from an appointed Information Technology representative that will oversee implementation and maintenance of the voting program. Tabulations shall take place immediately following the election period. The names of newly elected officials shall be posted within two (2) class days after the end of the tabulations in the Student Activities and Leadership Office. All…, Section H: Paper Ballot Tabulations, Tabulations of all votes shall be done by the Elections Task Force Ad-Hoc Committee, Student Activities and Leadership personnel, members of the Executive Committee, and one (1) other University personnel. Tabulations shall take place immediately following the election period. The names of newly elected officials shall be posted within two (2) class days after the end of the tabulations in the…, Section I: Special Elections, The Student Government shall call for special elections in cases of: Vacancy in the Student Trustee Office Any situation deemed as an emergency by vote of the Student Senate. The Student Senate shall call for a special election by a 2/3 vote of the full Student Senate. Announcements for special elections will occur at the earliest possible time. Special elections will follow the same procedure as…, Section J: Election of Student Trustee, The election of the Student Trustee will follow the above mentioned procedure where it applies except in cases where it conflicts with the Student and Trustee Election Policy of the Board of Trustees of the University of Massachusetts., Chapter IV: Membership, Section A: Seating of Members, A vacancy on the Student Senate shall be filled until the next election by the Student Senate. All new members, prior to being seated, shall be required to attend a mandatory orientation to be overseen by the Student Senate Advisor, the current members or representatives of the Executive Committee, and/or the Elections Task Force Ad-Hoc Committee. Funding for orientation will be allocated through…, Section B: Attendance, Any member of the Student Senate who is absent, without excuse, for two (2) consecutive regular meetings or a total of three (3) meetings per academic semester, or six (6) meetings per academic year will be dismissed unless a valid reason has been submitted to the President of the SGA for approval prior to the absence. Summer sessions that are missed shall count as half (1/2) absences. A valid…, Section C: Removal from Office, All student senators are subject to removal from a Senate committee, as a Senate liaison, or from the Senate altogether, by a vote of no confidence. A vote of no confidence shall be defined as a vote in favor of removal by a 2/3 majority of members present and voting on whose agenda the item has appeared. Any standing committee which presents a vote of no confidence against an officer, or…, Chapter V: Procedures of Meetings and Records, Section A: Agendas, The Executive Committee will set the agenda for all meetings. At the last regular meeting of the academic semester the SGA shall determine a meeting schedule for the following semester. The agenda of regularly scheduled SGA meetings, including all appropriate documents and minutes shall be prepared and posted by the appropriate committees three calendar days in advance of the next regular meeting…, Section B: Minutes, The minutes of all SGA meetings, including all appropriate documents, agendas and minutes shall be prepared, distributed and posted by the appropriate committees no later than three calendar days before the next general assembly. SGA minutes shall adhere to the following format: Title, including the name of the body Date, time and location of the meeting Attendance: those present and voting;…, Sections C: The SGA Filing System, All agendas, minutes, proposals, documents, letters and memos produced or receives by the members of the SGA shall be stored on file in the Senate Office. All files for the active calendar year shall be kept in the drawers of the appropriate committee desk, maintained by the chair, vice chair, or by an appointed committee member, with the Executive Committee storing material on behalf of the full…, Section D: The Senate Secretary, The Senate Secretary shall work no less than six hours per week. Funds from work-study are to be used in preference to 03 funds. Office hours will be set and fixed and can only be during the operating hours of the Office of Student Activities and Leadership. These hours shall include meetings of the full Senate and the Executive Committee, but not necessarily any other committees, standing or ad-…, Chapter VI: Amendments, Section A: Amendments, All Bylaw proposals shall be submitted to the Executive Committee. Bylaws presented for action that has not been reviewed by the Executive Committee shall be referred to that committee by the SGA. The Executive Committee shall present its recommendations on the agenda for the following SGA meeting. The Student Senate shall adopt, amend or rescind the Bylaws of the SGA by a 2/3 vote of those…, Chapter VII: Policy On Ethics, Section A: Conduct, Senators in the course of their duties, in accordance with the policy of the University of Massachusetts Boston and applicable federal and state laws, shall strive to overcome the handicaps of racism, sexism, and other forms of discrimination, intolerance and prejudice in the course of their duties. Whenever a Senator is ruled out of order two times during a meeting, s/he shall be asked by the…, Section B: Records of Activities, All Senators will be required to give a list of all their University-wide activities (i.e. work, administration committees, clubs, etc.) to the Executive Committee and submit updates as needed. All Senate committees, both standing and ad-hoc, must keep written minutes of meetings on file for any one to review. Upon request in writing, copies of the minutes shall be forwarded to the requesting…, Section C: Committee Regulations, Election Committee: No Senator who sits on the Election Committee shall work on campaigns in elections run by the Student Senate., Section D: Public Statements, Whereas the Student Senate is a deliberative assembly, a group that debates and decides on common action, no senator shall use the name of the Student Senate in the media, in conversation with University employees and vendors or in any public statement with out the Senate’s prior approval. Senators may, however, state that they are members of this organization if they make it clear that they are…, Section E: Voting, No Senator who is paid out of Student Activities Trust Fund or by any other University funds shall vote on matters relating to his/her job whether in committee or in the full Senate. SEOC members shall not vote on matters relating to Registered Student Organizations to which they belong. No Senator shall make motions on behalf of their SATF, RSO, or RCC funded job. Senators may only speak on…, Section F: Enforcement, Any SGA member who feels the Policy on Ethics has been violated shall inform the Executive Committee within fourteen (14) calendar days of when the alleged infraction occurred. The Executive Committee will review complaints at its next meeting. Complaints must be dated, typed, or legibly written, include date of alleged infraction, be signed by the member of the SGA and must be delivered in a…, Section G: Amendments, No amendment to this chapter can be enforced ex post facto.  , Doc. T98-059, as amended | Student Government Association Constitution, Boston, Passed by the Board of Trustees on June 3, 1998 Revised:  August 23, 2006
    Type: Book page
  • World Wide Web Policy & Guidelines (T99-059)
    Doc. T99-059, Passed by the Board of Trustees on August 4, 1999 The President of the University shall see to the development and implementation of guidelines governing University participation in the World Wide Web (WWW), which he may amend from time to time as appropriate or as required by law. If any University policy conflicts with federal or state statute, the applicable statute shall apply. Such…
    Type: Book page

Pagination

  • « First First page
  • ‹ Previous Previous page
  • …
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • …
  • Next › Next page
  • Last » Last page
University of Massachusetts Presidents Office
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube
User account menu
  • Directory
  • Careers
  • Log in

You are on UMassp.edu. For the University of Massachusetts system, visit  Massachusetts.edu.

© University of Massachusetts 2026

Footer - Related Sites
  • Massachusetts.edu
  • UMass Building Authority
  • UMass Club
  • UMass Foundation
  • UMass System Careers